Skip to content

Commit 426cfdd

Browse files
authored
Reverted changes on this page
Reverted changes on this page
1 parent 5b28d47 commit 426cfdd

File tree

1 file changed

+21
-19
lines changed

1 file changed

+21
-19
lines changed

articles/hdinsight/domain-joined/apache-domain-joined-create-configure-enterprise-security-cluster.md

Lines changed: 21 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -4,33 +4,33 @@ description: Learn how to create and configure Enterprise Security Package clust
44
services: hdinsight
55
ms.service: azure-hdinsight
66
ms.topic: how-to
7-
ms.date: 11/20/2024
7+
ms.date: 09/06/2024
88
ms.custom: devx-track-azurepowershell
99
---
1010

1111
# Create and configure Enterprise Security Package clusters in Azure HDInsight
1212

13-
Enterprise Security Package (ESP) for Azure HDInsight gives you access to Microsoft Entra ID-based authentication, multiuser support, and role-based access control for your Apache Hadoop clusters in Azure. HDInsight ESP clusters enable organizations that adhere to strict corporate security policies to process sensitive data securely.
13+
Enterprise Security Package (ESP) for Azure HDInsight gives you access to Active Directory-based authentication, multiuser support, and role-based access control for your Apache Hadoop clusters in Azure. HDInsight ESP clusters enable organizations that adhere to strict corporate security policies to process sensitive data securely.
1414

15-
This guide shows how to create an ESP-enabled Azure HDInsight cluster. It also shows how to create a Windows IaaS VM on which Microsoft Entra ID and Domain Name System (DNS) are enabled. Use this guide to configure the necessary resources to allow on-premises users to sign in to an ESP-enabled HDInsight cluster.
15+
This guide shows how to create an ESP-enabled Azure HDInsight cluster. It also shows how to create a Windows IaaS VM on which Active Directory and Domain Name System (DNS) are enabled. Use this guide to configure the necessary resources to allow on-premises users to sign in to an ESP-enabled HDInsight cluster.
1616

1717
The server you create will act as a replacement for your *actual* on-premises environment. You'll use it for the setup and configuration steps. Later you'll repeat the steps in your own environment.
1818

1919
This guide will also help you create a hybrid identity environment by using password hash sync with Microsoft Entra ID. The guide complements [Use ESP in HDInsight](apache-domain-joined-architecture.md).
2020

2121
Before you use this process in your own environment:
2222

23-
* Set up Microsoft Entra ID and DNS.
23+
* Set up Active Directory and DNS.
2424
* Enable Microsoft Entra ID.
2525
* Sync on-premises user accounts to Microsoft Entra ID.
2626

2727
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0002.png" alt-text="Microsoft Entra architecture diagram." border="false":::
2828

2929
## Create an on-premises environment
3030

31-
In this section, you'll use an Azure Quickstart deployment template to create new VMs, configure DNS, and add a new Microsoft Entra ID forest.
31+
In this section, you'll use an Azure Quickstart deployment template to create new VMs, configure DNS, and add a new Active Directory forest.
3232

33-
1. Go to the Quickstart deployment template to [Create an Azure VM with a new Microsoft Entra ID forest](https://azure.microsoft.com/resources/templates/active-directory-new-domain/).
33+
1. Go to the Quickstart deployment template to [Create an Azure VM with a new Active Directory forest](https://azure.microsoft.com/resources/templates/active-directory-new-domain/).
3434

3535
1. Select **Deploy to Azure**.
3636
1. Sign in to your Azure subscription.
@@ -65,15 +65,15 @@ In this section, you'll create the users that will have access to the HDInsight
6565
1. Enter the password that you chose for the admin account.
6666
1. Select **OK**.
6767

68-
1. From the domain controller **Server Manager** dashboard, navigate to **Tools** > **Microsoft Entra ID Users and Computers**.
68+
1. From the domain controller **Server Manager** dashboard, navigate to **Tools** > **Active Directory Users and Computers**.
6969

70-
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/server-manager-active-directory-screen.png" alt-text="On the Server Manager dashboard, open Microsoft Entra ID Management." border="true":::
70+
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/server-manager-active-directory-screen.png" alt-text="On the Server Manager dashboard, open Active Directory Management." border="true":::
7171

7272
1. Create two new users: **HDIAdmin** and **HDIUser**. These two users will sign in to HDInsight clusters.
7373

74-
1. From the **Microsoft Entra ID Users and Computers** page, right-click `HDIFabrikam.com`, and then navigate to **New** > **User**.
74+
1. From the **Active Directory Users and Computers** page, right-click `HDIFabrikam.com`, and then navigate to **New** > **User**.
7575

76-
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/create-active-directory-user.png" alt-text="Create a new Microsoft Entra ID user." border="true":::
76+
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/create-active-directory-user.png" alt-text="Create a new Active Directory user." border="true":::
7777

7878
1. On the **New Object - User** page, enter `HDIUser` for **First name** and **User logon name**. The other fields will autopopulate. Then select **Next**.
7979

@@ -87,13 +87,13 @@ In this section, you'll create the users that will have access to the HDInsight
8787

8888
1. Create a security group.
8989

90-
1. From **Microsoft Entra ID Users and Computers**, right-click `HDIFabrikam.com`, and then navigate to **New** > **Group**.
90+
1. From **Active Directory Users and Computers**, right-click `HDIFabrikam.com`, and then navigate to **New** > **Group**.
9191

9292
1. Enter `HDIUserGroup` in the **Group name** text box.
9393

9494
1. Select **OK**.
9595

96-
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/create-active-directory-group.png" alt-text="Create a new Microsoft Entra ID group." border="true":::
96+
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/create-active-directory-group.png" alt-text="Create a new Active Directory group." border="true":::
9797

9898
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0028.png" alt-text="Create a new object." border="true":::
9999

@@ -105,7 +105,7 @@ In this section, you'll create the users that will have access to the HDInsight
105105

106106
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/active-directory-add-users-to-group.png" alt-text="Add the member HDIUser to the group HDIUserGroup." border="true":::
107107

108-
You've now created your Microsoft Entra ID environment. You've added two users and a user group that can access the HDInsight cluster.
108+
You've now created your Active Directory environment. You've added two users and a user group that can access the HDInsight cluster.
109109

110110
The users will be synchronized with Microsoft Entra ID.
111111

@@ -141,9 +141,9 @@ The users will be synchronized with Microsoft Entra ID.
141141

142142
## Configure your Microsoft Entra tenant
143143

144-
Now you'll configure your Microsoft Entra tenant so that you can synchronize users and groups from the on-premises Microsoft Entra ID instance to the cloud.
144+
Now you'll configure your Microsoft Entra tenant so that you can synchronize users and groups from the on-premises Active Directory instance to the cloud.
145145

146-
Create a Microsoft Entra ID tenant administrator.
146+
Create an Active Directory tenant administrator.
147147

148148
1. Sign in to the Azure portal and select your Microsoft Entra tenant, **HDIFabrikam**.
149149

@@ -171,6 +171,8 @@ Create a Microsoft Entra ID tenant administrator.
171171
1. Select **User**.
172172
1. Select **Administrator**, and then **Select**.
173173

174+
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/azure-ad-add-role-member.png" alt-text="The Microsoft Entra role dialog box." border="true":::
175+
174176
1. Select **Create**.
175177

176178
1. Then have the new user sign in to the Azure portal where it will be prompted to change the password. You'll need to do this before configuring Microsoft Entra Connect.
@@ -189,11 +191,11 @@ Create a Microsoft Entra ID tenant administrator.
189191

190192
1. Select **Use express settings**.
191193

192-
1. On the **Connect to Microsoft Entra ID** page, enter the username and password. Use the username `[email protected]`. Then select **Next**.
194+
1. On the **Connect to Microsoft Entra ID** page, enter the username and password of the administrator for Microsoft Entra ID. Use the username `[email protected]` that you created when you configured your Active Directory tenant. Then select **Next**.
193195

194196
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0058.png" alt-text="Connect to Microsoft Entra ID." border="true":::
195197

196-
1. On the **Connect to Microsoft Entra ID Domain Services** page, enter the username and password for an enterprise admin account. Use the username `HDIFabrikam\HDIFabrikamAdmin` and its password that you created earlier. Then select **Next**.
198+
1. On the **Connect to Active Directory Domain Services** page, enter the username and password for an enterprise admin account. Use the username `HDIFabrikam\HDIFabrikamAdmin` and its password that you created earlier. Then select **Next**.
197199

198200
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0060.png" alt-text="Connect to A D D S page." border="true":::
199201

@@ -423,11 +425,11 @@ This step requires the following prerequisites:
423425
424426
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0137.jpg" alt-text="Assign the cluster admin role to hdiusergroup." border="true":::
425427
426-
1. Open your Secure Shell (SSH) client and sign in to the cluster. Use the **hdiuser** that you created in the on-premises Microsoft Entra ID instance.
428+
1. Open your Secure Shell (SSH) client and sign in to the cluster. Use the **hdiuser** that you created in the on-premises Active Directory instance.
427429
428430
:::image type="content" source="./media/apache-domain-joined-create-configure-enterprise-security-cluster/hdinsight-image-0139.jpg" alt-text="Sign in to the cluster by using the SSH client." border="true":::
429431
430-
If you can sign in with this account, you've configured your ESP cluster correctly to sync with your on-premises Microsoft Entra ID instance.
432+
If you can sign in with this account, you've configured your ESP cluster correctly to sync with your on-premises Active Directory instance.
431433
432434
## Next steps
433435

0 commit comments

Comments
 (0)